Chapter 07 - Linux Networking and Security Chapter 7...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Linux Networking and Security Chapter 7 Security, Ethics, and Privacy
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security, Ethics, and Privacy List security risks typical in modern networked computer systems Understand how to assess risk and create a security policy Describe the function of top security-awareness organizations Outline government’s security and privacy role Locate Linux products designed especially for security-conscious environments
Background image of page 2
Introducing Computer Security and Privacy Computer security is a large and specialized field, separate in many ways from the day-to-day operation of a network server There are many unauthorized computer access events due to the fact that the more broadly a computer is networked, the more potential for access to that computer This broad access is what represents the power of networked computers, but also represents opportunities for malicious intent
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Privacy Debate Any personal information stored on a computer is threatened by someone cracking the system where it is stored A great deal of personal information must be stored on computers to make government and businesses function efficiently Laws and government regulations control who can access your credit records; businesses typically provide privacy policies
Background image of page 4
The Privacy Debate
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Privacy Debate Privacy policies usually contain information similar to one of the following: We don’t collect or save any information about visitors to our web site We collect information in order to complete a sale or register users, but we do not share that data We collect information on visitors and use patterns to determine if a visitor might be interested in some of our other products We collect information and share it with our partners who may have products that interest you
Background image of page 6
Ethics and System Administrators The burden of ethical use of data typically falls on the system administrator Ethics deals with the issue of doing the right thing at the right time, for the right reason Ethics codes were developed to define the role of system administrators in organizations and to increase the respectability and raise standards of behavior in the profession Support organizations for system administrators include SAIR/GNU and SAGE
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Risk Assessment and Security Policies The best approach to security is to make a system highly secure without undue annoyance to authorized users “Security through obscurity” assumes that if no one knows about your system, you are safe, but this approach must be avoided Hardware, software and data are primary targets of attack, but of these three, data presents the most serious threat
Background image of page 8
Risk Assessment and Security Policies
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/03/2008 for the course PSYC 1xxx taught by Professor Carter during the Spring '07 term at Montana Tech.

Page1 / 29

Chapter 07 - Linux Networking and Security Chapter 7...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online